{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:35:05Z","timestamp":1742981705967,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609567"},{"type":"electronic","value":"9789819609574"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0957-4_14","type":"book-chapter","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:18Z","timestamp":1738272858000},"page":"246-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reusable Fuzzy Extractor from\u00a0Isogeny"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3452-7831","authenticated-orcid":false,"given":"Yu","family":"Zhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1366-8256","authenticated-orcid":false,"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8156-7089","authenticated-orcid":false,"given":"Shuai","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Alamati, N., Feo, L.D., Montgomery, H., Patranabis, S.: Cryptographic group actions and applications. In: ASIACRYPT 2020, vol. 12492, pp. 411\u2013439 (2020)","DOI":"10.1007\/978-3-030-64834-3_14"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Alam\u00e9lou, Q., et al.: Pseudoentropic isometries: a new framework for fuzzy extractor reusability. In: AsiaCCS 2018, pp. 673\u2013684 (2018)","DOI":"10.1145\/3196494.3196530"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Apon, D., Cho, C., Eldefrawy, K., Katz, J.: Efficient, reusable fuzzy extractors from LWE. In: CSCML 2017, pp. 1\u201318 (2017)","DOI":"10.1007\/978-3-319-60080-2_1"},{"issue":"2","key":"14_CR4","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"CH Bennett","year":"1988","unstructured":"Bennett, C.H., Brassard, G., Robert, J.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210\u2013229 (1988)","journal-title":"SIAM J. Comput."},{"key":"14_CR5","unstructured":"Beullens, W.: CSI-fish: Github repository (2019). https:\/\/github.com\/KULeuven-COSIC\/CSI-FiSh\/tree\/master\/implementation"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Beullens, W., Dobson, S., Katsumata, S., Lai, Y., Pintore, F.: Group signatures and more from isogenies and lattices: generic, simple, and efficient. In: EUROCRYPT 2022, vol. 13276, pp. 95\u2013126 (2022)","DOI":"10.1007\/978-3-031-07085-3_4"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-fish: efficient isogeny based signatures through class group computations. In: ASIACRYPT 2019, vol. 11921, pp. 227\u2013247 (2019)","DOI":"10.1007\/978-3-030-34578-5_9"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Boyen, X.: Reusable cryptographic fuzzy extractors. In: CCS 2004, pp. 82\u201391. ACM (2004)","DOI":"10.1145\/1030083.1030096"},{"key":"14_CR9","unstructured":"Bri\u00ebt, J., Perdrix, S.: Quantum computation and information - introduction to the special theme. ERCIM News 2018(112) (2018)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Canetti, R., Fuller, B., Paneth, O., Reyzin, L., Smith, A.D.: Reusable fuzzy extractors for low-entropy distributions. In: EUROCRYPT 2016, vol.\u00a09665, pp. 117\u2013146 (2016)","DOI":"10.1007\/978-3-662-49890-3_5"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: EUROCRYPT 2023, vol. 14008, pp. 423\u2013447 (2023)","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: ASIACRYPT 2018, vol. 11274, pp. 395\u2013427 (2018)","DOI":"10.1007\/978-3-030-03332-3_15"},{"issue":"1","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jmc-2012-0016","volume":"8","author":"AM Childs","year":"2014","unstructured":"Childs, A.M., Jao, D., Soukharev, V.: Constructing elliptic curve isogenies in quantum subexponential time. J. Math. Cryptol. 8(1), 1\u201329 (2014)","journal-title":"J. Math. Cryptol."},{"key":"14_CR14","unstructured":"Couveignes, J.M.: Hard homogeneous spaces. IACR Cryptology ePrint Archive, p.\u00a0291 (2006)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.D.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: EUROCRYPT 2004, vol.\u00a03027, pp. 523\u2013540 (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Feo, L.D., Galbraith, S.D.: Seasign: compact isogeny signatures from class group actions. In: EUROCRYPT 2019, vol. 11478, pp. 759\u2013789 (2019)","DOI":"10.1007\/978-3-030-17659-4_26"},{"issue":"5","key":"14_CR17","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1109\/TIT.2008.920211","volume":"54","author":"JD Golic","year":"2008","unstructured":"Golic, J.D., Baltatu, M.: Entropy analysis and new constructions of biometric key generation systems. IEEE Trans. Inf. Theory 54(5), 2026\u20132040 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"14_CR18","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder, C., Yu, M.M., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126\u20131141 (2014)","journal-title":"Proc. IEEE"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Jao, D., Feo, L.D.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: PQCrypto 2011, vol.\u00a07071, pp. 19\u201334 (2011)","DOI":"10.1007\/978-3-642-25405-5_2"},{"issue":"12","key":"14_CR20","first-page":"7172","volume":"22","author":"M Jiang","year":"2023","unstructured":"Jiang, M., Liu, S., Lyu, Y., Zhou, Y.: Face-based authentication using computational secure sketch. IEEE Trans. Mob. Comput. 22(12), 7172\u20137187 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"14_CR21","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1109\/TIFS.2012.2191961","volume":"7","author":"EJC Kelkboom","year":"2012","unstructured":"Kelkboom, E.J.C., Breebaart, J., Buhan, I., Veldhuis, R.N.J.: Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources. IEEE Trans. Inf. Forensics Secur. 7(4), 1225\u20131241 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Lai, Y., Galbraith, S.D., de\u00a0Saint\u00a0Guilhem, C.D.: Compact, efficient and UC-secure isogeny-based oblivious transfer. In: EUROCRYPT 2021, vol. 12696, pp. 213\u2013241 (2021)","DOI":"10.1007\/978-3-030-77870-5_8"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Li, N., Guo, F., Mu, Y., Susilo, W., Nepal, S.: Fuzzy extractors for biometric identification. In: ICDCS 2017, pp. 667\u2013677 (2017)","DOI":"10.1109\/ICDCS.2017.107"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: EUROCRYPT 2023, vol. 14008, pp. 448\u2013471 (2023)","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Montgomery, H., Zhandry, M.: Full quantum equivalence of group action DLOG and CDH, and more. In: ASIACRYPT 2022, vol. 13791, pp. 3\u201332 (2022)","DOI":"10.1007\/978-3-031-22963-3_1"},{"key":"14_CR26","unstructured":"Rostovtsev, A., Stolbunov, A.: Public-key cryptosystem based on isogenies. IACR Cryptology ePrint Archive, p.\u00a0145 (2006)"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves. Graduate Texts in Mathematics, vol.\u00a0106 (1986)","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: DAC 2007, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"14_CR29","unstructured":"Washington, L.C.: Elliptic curves: number theory and cryptography (2008)"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Waterhouse, W.C.: Abelian varieties over finite fields. In: Annales scientifiques de l\u2019\u00c9cole normale sup\u00e9rieure, vol.\u00a02, pp. 521\u2013560 (1969)","DOI":"10.24033\/asens.1183"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Wen, Y., Liu, S.: Reusable fuzzy extractor from LWE. In: ACISP 2018, vol. 10946, pp. 13\u201327 (2018)","DOI":"10.1007\/978-3-319-93638-3_2"},{"issue":"11","key":"14_CR32","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s10623-018-0459-4","volume":"86","author":"Y Wen","year":"2018","unstructured":"Wen, Y., Liu, S., Han, S.: Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. Des. Codes Cryptogr. 86(11), 2495\u20132512 (2018)","journal-title":"Des. Codes Cryptogr."}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0957-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:27Z","timestamp":1738272867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0957-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819609567","9789819609574"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0957-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2024.github.io\/ProvSec2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}